General

  • Target

    53e05dcabe00916f6ef2420a03b8350a71f01391cba91415cbbf5b55660d9f30

  • Size

    395KB

  • Sample

    241104-xleqgavfmd

  • MD5

    caa5aca0c36e48ed6901c676e332c26a

  • SHA1

    efe60a5048070a9eb13bb90a5a3bbd379e455664

  • SHA256

    53e05dcabe00916f6ef2420a03b8350a71f01391cba91415cbbf5b55660d9f30

  • SHA512

    cf3ca8322a62747ea59acd34d454e3a62b4016dd0a8ba1708c146692e34cfca96160405c2e900af3534149550c40fef09624f3e6c5924b4caf944169e59d62d2

  • SSDEEP

    6144:JPPjijEba6j3YpoG2Q9f3kqutSGTWg4VsHdl7HFIIn4QFFW5nfgR4CF0u:NjAEO6jSoGF9f67TW9VUVJnXFIgj

Malware Config

Extracted

Family

redline

Botnet

UTS

C2

45.9.20.20:13441

Targets

    • Target

      53e05dcabe00916f6ef2420a03b8350a71f01391cba91415cbbf5b55660d9f30

    • Size

      395KB

    • MD5

      caa5aca0c36e48ed6901c676e332c26a

    • SHA1

      efe60a5048070a9eb13bb90a5a3bbd379e455664

    • SHA256

      53e05dcabe00916f6ef2420a03b8350a71f01391cba91415cbbf5b55660d9f30

    • SHA512

      cf3ca8322a62747ea59acd34d454e3a62b4016dd0a8ba1708c146692e34cfca96160405c2e900af3534149550c40fef09624f3e6c5924b4caf944169e59d62d2

    • SSDEEP

      6144:JPPjijEba6j3YpoG2Q9f3kqutSGTWg4VsHdl7HFIIn4QFFW5nfgR4CF0u:NjAEO6jSoGF9f67TW9VUVJnXFIgj

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks